Podcast
Questions and Answers
Which IEEE standard designates all wireless networking standards?
Which IEEE standard designates all wireless networking standards?
How many non-overlapping channels are available in the 2.4 GHz range?
How many non-overlapping channels are available in the 2.4 GHz range?
Which encryption algorithm is used by WPA2?
Which encryption algorithm is used by WPA2?
What method allows a device to connect to a wireless network just by pressing a button?
What method allows a device to connect to a wireless network just by pressing a button?
Signup and view all the answers
What is the primary purpose of Multi-User, Multiple-Input, Multiple-Output (MU-MIMO)?
What is the primary purpose of Multi-User, Multiple-Input, Multiple-Output (MU-MIMO)?
Signup and view all the answers
What type of VPN allows individual hosts to connect to a VPN server for access to network resources?
What type of VPN allows individual hosts to connect to a VPN server for access to network resources?
Signup and view all the answers
Which VPN protocol was developed by Microsoft and primarily supports TCP/IP?
Which VPN protocol was developed by Microsoft and primarily supports TCP/IP?
Signup and view all the answers
What is a key limitation of the Master Boot Record (MBR) in disk partitioning?
What is a key limitation of the Master Boot Record (MBR) in disk partitioning?
Signup and view all the answers
Which tunneling protocol encapsulates packets without providing encryption?
Which tunneling protocol encapsulates packets without providing encryption?
Signup and view all the answers
Which of the following correctly defines Storage Spaces in Windows?
Which of the following correctly defines Storage Spaces in Windows?
Signup and view all the answers
Which frequency range typically allows for greater distance but slower data transmission rates in wireless networks?
Which frequency range typically allows for greater distance but slower data transmission rates in wireless networks?
Signup and view all the answers
What issue can occur if two wireless devices use the same frequency in close proximity?
What issue can occur if two wireless devices use the same frequency in close proximity?
Signup and view all the answers
Which type of wireless authentication method allows any device to connect without a password?
Which type of wireless authentication method allows any device to connect without a password?
Signup and view all the answers
What technology allows for multiple-user efficiency by enabling several devices to utilize the same channel at once?
What technology allows for multiple-user efficiency by enabling several devices to utilize the same channel at once?
Signup and view all the answers
What type of wireless network typically requires special equipment and possibly permission for licensed frequencies?
What type of wireless network typically requires special equipment and possibly permission for licensed frequencies?
Signup and view all the answers
What can happen if the power of a wireless access point is increased beyond the recommended levels?
What can happen if the power of a wireless access point is increased beyond the recommended levels?
Signup and view all the answers
What is the main function of a RADIUS server in a wireless 802.1x implementation?
What is the main function of a RADIUS server in a wireless 802.1x implementation?
Signup and view all the answers
Which encryption protocol is considered the best option for most wireless networks?
Which encryption protocol is considered the best option for most wireless networks?
Signup and view all the answers
What does WPA2-Personal use to protect the network?
What does WPA2-Personal use to protect the network?
Signup and view all the answers
What is the primary purpose of using perfect forward secrecy in WPA3?
What is the primary purpose of using perfect forward secrecy in WPA3?
Signup and view all the answers
Which security measure can create an additional barrier to potential attackers on a wireless network?
Which security measure can create an additional barrier to potential attackers on a wireless network?
Signup and view all the answers
What does the 4-way handshake in WPA2 establish between a device and access point?
What does the 4-way handshake in WPA2 establish between a device and access point?
Signup and view all the answers
What does Remote Authentication Dial-In Service (RADIUS) primarily provide?
What does Remote Authentication Dial-In Service (RADIUS) primarily provide?
Signup and view all the answers
Which version of WPA2 requires a RADIUS server for user authentication?
Which version of WPA2 requires a RADIUS server for user authentication?
Signup and view all the answers
What is the main security benefit of disabling SSID broadcast?
What is the main security benefit of disabling SSID broadcast?
Signup and view all the answers
Study Notes
Wireless Networking
- IEEE 802.11 standard defines how wireless networks operate
- 2.4 GHz range has 3 non-overlapping channels
- 5 GHz range has 24 non-overlapping channels
- WPA2 uses AES-CCMP encryption algorithm
- Wi-Fi Protected Setup (WPS) allows devices to connect to a wireless network by pressing a button
Authentication Protocols
- Pre-Shared Key (PSK) uses a passphrase to authenticate users
- Wi-Fi Protected Setup (WPS) allows automatic connection between a device and a wireless access point
- Open network requires no authentication
- Captive portal forces users to agree to terms or pay a fee before accessing a network
Wireless Security
- WPA2 uses AES-CCMP encryption algorithm
- WPA3 uses Simultaneous Authentication of Equals (SAE) standard and perfect forward secrecy
- 802.1x is a secure authentication method for wired and wireless networks
- RADIUS is a triple-A protocol that provides authentication, authorization, and accounting management
VPNs
- VPN uses encryption to securely send IP traffic
- Host-to-host VPN - two hosts communicate directly
- Site-to-site VPN - routers on each site establish a connection
- Remote access VPN - a server accepts VPN connections from individual hosts
VPN Protocols
- Point-to-Point Tunneling Protocol (PPTP) uses CHAP and PAP for authentication
- Layer 2 Tunneling Protocol (L2TP) uses IPsec for encryption
- IPsec offers authentication and encryption through Authentication Header (AH) and Encapsulating Security Payload (ESP)
Hard Drive Basics
- Hard disk drive (HDD) has spinning metal platters
- Solid-state drive (SSD) uses flash memory chips and has no moving parts
- MBR (Master Boot Record) partitions are used on older 32-bit computers and have a 2 TB drive size limit
- GPT (GUID Partition Table) supports volumes larger than 2 TB
Disk Management
- Storage Spaces groups two or more drives into a storage pool
-
Storage pools can be configured in different ways:
- Simple - acts as a single drive
- Mirrored - duplicates data across multiple drives
- Parity - uses a single drive for parity data for redundancy
- Tiered - uses drives with different performance for different types of data
Storage Devices
- Solid-state drive (SSD): Stores data on flash memory chips, retains data even without power. Has no moving parts.
- Physical hard drive can be split into multiple logical drives by creating volumes or partitions.
-
Windows client partitioning supports two types:
- GUID Partition Table (GPT): Used by modern devices, provides more features, supports volumes larger than 2 TB.
- Master Boot Record (MBR): Used by older 32-bit systems, has removable drives.
Disk Management
- Windows system utility for managing and configuring storage devices.
- Accessible via:
- Right-click Start button > Disk Management.
- Search taskbar for "diskmgmt.msc".
- Right-click Start button > Computer Management > Disk Management.
- Type "diskmgmt" in PowerShell or Command Prompt.
Storage Spaces
- Introduced in Windows 8.
- Provide redundancy and increased performance.
- Similar to RAID configurations, but managed by Windows.
- Require at least two drives in addition to the Windows drive.
- Cannot include the drive with Windows installed.
- Require creating a storage pool.
Storage Pools
- Collection of disks forming one large storage space.
- Partitioned disks cannot be added.
- Can be configured with different resiliency types for data replication.
Simple Space
- Designed for performance without data redundancy.
- Data split evenly between drives, reducing processing time.
- Comparable to RAID 0 configuration.
- Best for temporary data like video rendering or image editing.
Mirror Space
- Designed for performance and data protection.
- Replicates data to multiple disks.
- Resiliency types:
- Two-way mirror: Requires two drives, writes two copies of data, allows one disk failure. Comparable to RAID 1.
- Three-way mirror: Requires five drives, writes three copies of data, allows two simultaneous drive failures. Comparable to RAID 1 and RAID 5.
Parity Space
- Provides data redundancy, comparable to RAID 5.
- Requires at least three drives.
- Uses parity information on each drive to recover data in case of a drive failure.
- Allows for one drive failure with three drives, two drive failures with seven drives.
Dual Parity Space
- Writes data with parity information on two disks for two drive failure protection.
- Requires at least five physical disks.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on wireless networking standards and technologies with this quiz. Questions cover topics such as IEEE standards, encryption methods, VPN protocols, and wireless communication techniques. Perfect for students and professionals looking to brush up on their networking skills.